Abstract
In this paper we introduce the problem of watermark security for systems in which an implementation of a watermark detector is available to an attacker. This paper serves as an introduction to a keynote talk at IWDW 2006. This talk will review two homomorphic encryption methods, viz. Paillier and Goldwasser & Micali, and their application to secure detection of Quantization Index Modulation (QIM) watermarks.
Similar content being viewed by others
References
Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Cox, I., Linnartz, J.-P.: Public watermarks and resistance to tampering. In: Proceedings of the International Conference on Image Processing (ICIP 1997), pp. 26–29 (1997)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Science 28, 270–299 (1984)
Kalker, T.: Secure watermark detection. In: Proceedings of the 39th Allerton Conference On Communication, Control, And Computing (2005)
Malkin, M., Kalker, T.: A cryptographic method for secure watermark detection. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 26–41. Springer, Heidelberg (2007)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
Trusted Computing Group. Trusted Platform Module, https://www.trustedcomputinggroup.org/groups/tpm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kalker, T., Malkin, M. (2006). Secure Quantization Index Modulation Watermark Detection. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_2
Download citation
DOI: https://doi.org/10.1007/11922841_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)